Ubuntu Security Notice 6994-1 - It was discovered that Netty did not properly sanitize its input parameters. A remote attacker could possibly use this issue to cause a crash. It was discovered that Netty incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause Netty to consume resources, leading to a denial of service.
151f4791ce1bf18350da328db884812f982e73c362b6de11f386b30f3d2006ef
==========================================================================
Ubuntu Security Notice USN-6994-1
September 05, 2024
netty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in Netty.
Software Description:
- netty: Java NIO client/server socket framework
Details:
It was discovered that Netty did not properly sanitize its input
parameters. A remote attacker could possibly use this issue to cause a
crash. (CVE-2023-34462)
It was discovered that Netty incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause Netty to consume
resources, leading to a denial of service. (CVE-2023-44487)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
libnetty-java 1:4.1.48-4+deb11u2build0.22.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6994-1
CVE-2023-34462, CVE-2023-44487
Package Information:
https://launchpad.net/ubuntu/+source/netty/1:4.1.48-4+deb11u2build0.22.04.1